Technical Support Fundamentals
Technical Support Fundamentals is a first course of Google IT Support Professional Certificate.
It has been divided into following modules:
Technical Support Fundamentals is a first course of Google IT Support Professional Certificate.
It has been divided into following modules:
It is the first module, of the Technical Support Fundamentals.
The use of digital technology, like computers and the internet, to store and process data into useful information.
A device that stores and process data performing calculations.
The oldest known computer, invented in 500 BC to count large numbers.
It was able to perform summation, subtraction, multiplication, and division but still need human intervention to operate its knob and levers.
It was a combination of sophisticated mechanical calculators and was able to perform pretty complex mathematical operations but not much else.
Babbage followed his Difference Engine with an Analytical Engine, he was inspired by Punch Cards, and it was able to perform automatic calculations without human interaction.
But it was still a giant Mechanical Computer, though being impressive.
A Mathematician, Ada Lovelace, realize the true potential of the Analytical Engine. She was the first person to recognize that a machine can be used more than just for pure calculations. She developed the first algorithm for the Engine.
Because of this discovery of Lovelace, the Analytical Engine became the first general purpose computing device in the history.
A series of steps that solve specific problems.
The communication that a computer uses, also known as a base-2 numeral system.
Examples:
10100011, 11110011, 00001111
Assigns our binary values to characters, so that we as human can read them.
The oldest used character encoding system for English alphabet, digits, punctuation marks.
The most prevalent encoding standard used today. Along with the same ASCII table, it lets us use the variable number of bytes.
As in Punch Card systems, a hole represents the number 1, and no-hole represents the number 0.
In binary, electrical circuits are used to represent zeros and ones (0s,1s), when current passes through the circuit, the circuit is on, and it represents 1, when no electricity passes, the circuit is closed and represents 0.
Allow our transistors to do more complex tasks, like decide where to send electrical signals depending on logical conditions.
AND logic gate
OR logic gate
NOT logic gate
XOR logic gate
NAND logic gate
XNOR logic gate
256 | 128 | 64 | 28 | 16 | 8 | 4 | 2 | unit(0,1) | Decimal System |
---|---|---|---|---|---|---|---|---|---|
0 | 0 | ||||||||
1 | 1 | ||||||||
1 | 0 | 2 | |||||||
1 | 1 | 3 | |||||||
1 | 0 | 0 | 4 | ||||||
1 | 0 | 1 | 5 | ||||||
1 | 1 | 0 | 6 | ||||||
1 | 1 | 1 | 7 | ||||||
1 | 0 | 0 | 0 | 8 | |||||
1 | 0 | 0 | 1 | 9 | |||||
1 | 0 | 1 | 0 | 10 |
“To take a relatively complex system and simplify it for our use.”
We don’t interact with the computers in the form of 0s and 1s (we actually do), instead an abstraction layer like, keyboard, mouse, error messages instead of showing a bunch of machine code etc.
How we as human interact with our computer.
User interacts with a computer. One can operate, maintain, and even program the computer.
They are just computers that can fit on or under our desks.
The following are components of a desktop:
They have all the components baked-in inside a single chassis.
To extend the functionality of a computer, we can plug devices into connection points on it.
The brain of our computer, it does all the calculations and data processing.
Our computer’s short-term memory.
Holds all of our data, which includes all of our music, pictures, applications.
The body or circulatory system of the computer that connects all the pieces together.
It converts the wall power supply to the format which our computer can use.
Instructions that tell the computer what to do.
Literally, a list of instructions that our CPU is able to run.
To cool down CPU, attached with a cooler fan.
In today’s system, we use another type of RAM, called the double data rate SDRAM or DDR SDRAM for short.
Just like the CPU, make sure your RAM module is compatible with your motherboard.
Every motherboard has few characteristics:
A chipset is a key component of our motherboard that allows us to manage data between our CPU, RAM, and peripherals.
It decides how components talk to each other on our machine:
External devices we connect to our computer, like a mouse, keyboard, and monitor.
Give us the ability to increase the functionality of our computer.
There are different sizes of motherboards available in market toady.
HDD (Hard disk drive)
SDD (solid state drive)
There are few interfaces that hard drive use to connect our system:
ATA ; the most common ATA is serial ATA or SATA
NVM Express or NVMe are used for more modern SSDs and reduces the pitfalls of SATA
The kilobyte is a multiple of the unit byte for digital information.
It converts the AC we get from the wall into low voltage DC that we can use and transmit throughout our computer.
Power supplies have the following components:
An ampere, often abbreviated as “A,” is the unit of electric current in the International System of Units (SI). Electric current is the flow of electric charge through a conductor, such as a wire. One ampere is defined as the amount of current that flows when one coulomb of electric charge passes through a given point in a circuit per second.
In equation form, it can be expressed as:
$$ 1A = 1C/s $$
This means that if a current of 1 ampere is flowing in a circuit, it indicates that 1 coulomb of charge is passing through a particular point in the circuit every second.
The amount of volts and amps that a device needs.
Mobile devices are a computer too. They have:
Very small mobile devices uses system-on-chip or SoC
Packs the CPU, RAM, and sometimes even the storage onto a single chip
Components require to charge batteries:
One full charge and discharge of a battery.
Anything that you connect to your computer externally that add functionality
Examples:
Projectors are display devices for when you need to share information with people in the same location! Most projectors can be used just like any other display on a computer, and with a few differences, can be troubleshot just like any other display device. For example, projectors can have dead or stuck pixels, and can acquire image burn-in, just like other types of displays.
Our CPU doesn’t know that there is a device that it can talk to, so it has to connect to something called the BIOS
The BIOS is software that helps initialize the hardware in our computer and gets our operating system up and running.
It performs the following functions:
Initialize hardware
POST or power on self test
Checks what devices are connected to the computer
The BIOS can be stored on the motherboard in the following components:
ROM or read only memory
More modern systems use UEFI stands for Unified Extensible Firmware Interface
Eventually, UEFI will become the predominant BIOS
They contain the instructions our CPU needs to understand external devices like keyboards, webcams, printers.
When the computer starts it runs systems checks from time to time, refer to as POST.
It stores basic data about booting your computer like the date, time and how you wanted to start up.
A frequently performed IT task is the reimaging of a computer.
It refers to a disk image which a copy of an operating system, the process involves wiping and reinstalling an operating system.
The following devices can be used for reimaging:
To build a PC, we need to take care of certain things:
Removes all data, apps, and customization from the device.
An operating system (OS) is software that manages computer hardware and facilitates communication between applications and the underlying hardware. It oversees processes, allocating resources like CPU and memory, and provides a file system for data organization. The OS interacts with input/output devices and often includes a user interface for human-computer interaction. It ensures security through features like user authentication and access control. Examples include Windows, macOS, Linux, and mobile OS like Android and iOS. The OS is a fundamental component that enables the proper functioning of computers and devices.
Allows us to manage multiple machines from anywhere in the world.
A protocol implemented by other programs to securely access one computer from another.
Allows you to connect to a private network, like your work network, over the Internet.
A free, open source software that you can use to make remote connections through several network protocols, including SSH.
DOING PuTTY can be used from CL, as putty.exe & ssh user@ip\<address>
PuTTY comes with a Plink or PuTTYlink program, which can also be used for SSH-ing to other computers.
Microsoft provides another way to remotely connect with Windows computer via GUI, called Remote Desktop Protocol (RDP).
The whole package that manages our computerās resources and lets us interact with it.
File storage include three things:
Improves faster handling of data because the data is not stored as one long piece and can be accessed quicker.
A program that is executing, like our internet browser or text editor.
An application that we can run, like Chrome.
A very short interval of time, that gets allocated to a process for CPU execution.
The combination of hard drive space and RAM that acts like memory that our processes can use.
Allocated Space for virtual memory.
Two ways to interact with the OS
Shell
A program that interprets text commands and sends them to the OS to execute.
GUI
Files that record system events on our computer, just like a system’s diary.
The computer boots in the following order.
A low-level software that initializes our computer’s hardware to make sure everything is good to go.
Power on Self Test (POST) is performed to make sure the computer is in proper working order.
A small program that loads the OS.
This layer describes that how devices connect to each other at the physical level. On this level, twisted-pair cables and duplexing is used.
Duplex communication has two types;
Half-duplex: Communication is possible only in one direction at a time.
Full-Duplex/Duplex: The information can flow in the both direction at the same time.
The information travels in the form of bits in the Physical layer.
Responsible for defining a common way of interpreting signals coming from the physical layer, so network devices can communicate with each other.
It consists of following protocols;
The data sent in this layer in the form of frames. We can identify devices working at the Physical layer by their MAC addresses.
This layer corresponds to the combination of Data Link Layer and Physical Layer of OSI Model. It looks out for hardware addressing and the protocols present in this layer allows for the physical transmission of data.
This layer includes
IP addressing
Encapsulation
The unit of data in the network layer is datagram.
Transport layer is the second layer in TCP/IP model. It is an end-to-end layer used to deliver messages to a host. It is termed an end-to-end layer because it provides a point-to-point connection rather of hop-to-hop, between the source host and destination host to deliver the services reliably. The unit of data in the transport layer is a segment.
Multiplexing allows simultaneous use of different applications over a network that is running on a host. The transport layer provides this mechanism, which enables us to send packet streams from various applications simultaneously over a network. The transport layer accepts these packets from different processes, differentiated by their port numbers, and passes them to the network layer after adding proper headers. Similarly, Demultiplexing is required at the receiver side to obtain the data coming from various processes. Transport receives the segments of the data from the network layer and delivers it to the appropriate process running of the receiversā machine.
A globally unique identifier attached to the individual network interfaces. It is a 48-bits number, normally represented by 6 groups of 2 hexadecimal numbers.
MAC addresses split up into two categories;
1) Organizationally Unique Identifier (UIO):
The first three groups represent the UIO of the device, which is unique to every organization issuing it. I.e., for Cisco, UIO is 00 60 2F.
2) Vendor Assigned(NIC Cards, interfaces):
The last three octets are assigned by the vendor, depending upon their preferences. Which tells us about that particular device it’s assigned for.
An IP address, or Internet Protocol address, is a series of numbers that identifies any device on a network. Computers use IP addresses to communicate with each other, both over the internet and on other networks.
An IP address consists of 4 octets of 8 bits, so it has 32-bits in total. There are two types of IP addresses;
IPv4 addresses consist of 4 octets of decimal numbers, each octet range from 0-255. There are only 4 billion IPv4 addresses to use for us, so we need some other way to assign IPs to the devices to overcome the shortage of IP addresses.
IPv4 addresses are further divided into three major classes;
a) Class-A Addresses: These have only the first octet for network ID, and the rest for the host IDs.
b) Class-B Addresses: These have the first 2 octets for network IDs, and the rest for the host IDs.
c) Class-C addresses: These have first 3 octets for Network IDs, and the only last one for host IDs.
IPv6 addresses has 132-bit of hexadecimal numbers, it has 2^128 IP addresses, which solves our problem of IP address shortage.
A 16-bit number that’s used to direct traffic to specific services running on a networked computer.
There are almost, 65535 ports available to use which are categorized as follows;
Port 0 used for internal traffic between different programs on the same computer.
Ports 1-1024 are called system ports or well known ports. These are used for some well known services such HTTP, FTP, SMTP and require admin level privileges for the port to be accessed.
Ports 1025-49151 are called registered ports. They are used for the services not well known as used by system ports. They don’t require admin level access for the port to be accessed.
Ports 49152-65535 are called ephemeral ports. They are used for establishing outbound connections.
A checksum is a value that represents the number of bits in a transmission message and is used by IT professionals to detect high-level errors within data transmission.
The common algorithm used for checksum is MD5, SHA-2 etc
A routing table is a set of rules, often viewed in table format, that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed. All IP-enabled devices, including routers and switches, use routing tables.
Destination | Subnet mask | Interface |
---|---|---|
128.75.43.0 | 255.255.255.0 | Eth0 |
128.75.43.0 | 255.255.255.128 | Eth1 |
192.12.17.5 | 255.255.255.255 | Eth3 |
default | Eth2 |
A routing table contains the information necessary to forward a packet along the best path toward its destination. Each packet contains information about its origin and destination. The routing table provides the device with instructions for sending the packet to the next hop on its route across the network.
Each Entry in the routing table consists of the following route.
The network ID or destination corresponding to the route.
The mask that is used to match a destination IP address to the network ID.
The IP address to which the packet is forwarded.
Outgoing interface the packet should go out to reach the destination network.
A common use of the metric is to indicate the minimum number of hops (routers crossed) to the network ID.
Routing table entries can be used to store the following types of routes:
Time-to-live (TTL) in networking refers to the time limit imposed on the data packet to be in-networking before being discarded. It is an 8-bit binary value set in the header of Internet Protocol (IP) by sending the host. The Purpose of a TTL is to prevent data packets from being circulated forever in the network. The maximum TTL value is 255, while the commonly used one is 64.
Translating one language to another.
Coding in a scripting language.
Coding in a programming language.
Special languages that software developers use to write instructions for computers to execute.
Any software created to fulfill a specific need, like a text editor, web browser, or graphic editor.
Software used to keep our core system running, like OS tools and utilities.
Software that is permanently stored on a computer component.
The concept of taking a complex system and simplifying it for use.
Allowed computer scientists to use human-readable instructions, assembled into code, that the machine could understand.
Uses human-readable instructions, then sends them through a compiler.
The script is run by an interpreter, which interprets the code into CPU instructions just in time to run them.
1) Ask Questions
2) Isolating the Problem
3) Follow the Cookie Crumbs
4) Troubleshooting Pitfalls to Avoid
The ability to diagnose and resolve an issue.
The main factor that is causing a range of issues.
Build the trust between you and the User.
Know the Company Policies about handling support request.
Following are some important features for IT Support.
Exhibiting empathy
Being conscious of your tone
Acknowledge the Person
Developing the trust
Some ticketing systems help track the user issues.
Bugzilla
JIRA
Redmine
Using the ticketing system and documentation is important for two reasons.
It keeps the user in the loop.
It helps you audit your steps in case you need to go back and see what you did.
A common way of documenting an issue.
Issues with the system that weren’t caused by an external source.
System and processes are always changing, so should your documentation.
Always write documentation that is easy to read and follow for your user.
Your resume is your first introduction to a new company.
A short summary of who you are and what kind of career you are looking for.
An elevator pitch is a short description of yourself. The name comes from the fact that you want it to be so short that you can deliver it to someone that you are meeting in an elevator ride.
Hi! Iām Jamie, Iām in my senior year at Springfield University, studying Computer Science. I enjoy being able to help people and solve problems, so Iām looking forward to putting my tech skills into practice by working as an IT Support Specialist after I graduate.
Hi! Iām Ellis, Iāve been working at X Company as an IT Support Specialist for the past two years. During those years, Iāve learned a lot about operating systems and networking, and Iām looking to switch to a system administrator position, where I can focus on large scale deployments.